Sciweavers

378 search results - page 17 / 76
» Security requirement analysis of business processes
Sort
View
WCE
2007
13 years 8 months ago
Performing Early Feasibility Studies of Software Development Projects Using Business Process Models
—A new approach to perform feasibility studies using business process models is proposed. The utilization of the improved Role Activity Diagram notations has led to the extractio...
Ayman Issa, Faisal A. Abu Rub
ER
2006
Springer
169views Database» more  ER 2006»
13 years 9 months ago
A More Expressive Softgoal Conceptualization for Quality Requirements Analysis
Initial software quality requirements tend to be imprecise, subjective, idealistic, and context-specific. An extended characterization of the common Softgoal concept is proposed fo...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
JOT
2008
108views more  JOT 2008»
13 years 7 months ago
Requirements analysis for large scale systems
All readers of this paper most likely have knowledge of the software requirements discipline and of the use case notation, however not everyone is aware that with the progress of ...
Roger Johnson, George Roussos, Luca Vetti Tagliati
BPM
2008
Springer
164views Business» more  BPM 2008»
13 years 9 months ago
Analyzing Business Continuity through a Multi-layers Model
Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Cont...
Yudistira Asnar, Paolo Giorgini
SIGSAND
2008
13 years 9 months ago
Advanced Reduction Rules for the Verification of EPC Business Process Models
: Conceptual business process models such as Event-driven Process Chains (EPCs) play an important role in the business process management life cycle. The problem in this context is...
Jan Mendling, Wil M. P. van der Aalst